You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-stack/operator/app-service-release-notes-2024R1.md
+47-2Lines changed: 47 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,10 +3,9 @@ title: App Service on Azure Stack Hub 24R1 release notes
3
3
description: Learn about what's new and updated in the App Service on Azure Stack Hub 24R1 release.
4
4
author: apwestgarth
5
5
ms.topic: article
6
-
ms.date: 12/09/2024
6
+
ms.date: 01/31/2025
7
7
ms.author: anwestg
8
8
ms.reviewer:
9
-
10
9
---
11
10
12
11
# App Service on Azure Stack Hub 24R1 release notes
@@ -284,6 +283,52 @@ This script must be run under the following conditions:
284
283
GO
285
284
```
286
285
286
+
- A new Redirect URL must be added to the Identity Application created in order to support Single Sign On(SSO) Scenarios (for example Kudu)
287
+
288
+
# [Entra ID](#tab/EntraID)
289
+
290
+
## Retrieve the Identity Application Client ID
291
+
1. In the Azure Stack admin portal, navigate to the **ControllersNSG** Network Security Group.
292
+
1. By default, remote desktop access is disabled to all App Service infrastructure roles. Modify the **Inbound_Rdp_3389** rule action to **Allow** access.
293
+
1. Navigate to the resource group containing the App Service Resource Provider deployment. By default, the resource group is named with the format `AppService.<region>`, and connected to **CN0-VM**.
294
+
1. Launch the **Web Cloud Management Console**.
295
+
1. Check the **Web Cloud Management Console -> Web Cloud** screen and verify that both **Controllers** are **Ready**.
296
+
1. Select **Settings**.
297
+
1. Find the **ApplicationClientId** setting. Retrieve the value.
298
+
1. In the Azure Stack admin portal, navigate back to the **ControllersNSG** Network Security Group.
299
+
1. Modify the **Inbound_Rdp_3389** rule to deny access.
300
+
301
+
## Update the Entra ID Application with new Redirect URI
302
+
303
+
1. Sign into the **Azure** Portal to access the Entra ID tenant you connected your Azure Stack Hub to at deployment time.
304
+
1. Using the **Azure** Portal and navigate to **Microsoft Entra ID**
305
+
1. Search your tenant for the ApplicationClientId you retrieved earlier.
306
+
1. Select the Application
307
+
1. Select **Authentication**
308
+
1. Add an additional Redirect URI to the existing list - **https://azsstamp.sso.appservice.\<region\>.\<DomainName\>.\<extension\>**
309
+
310
+
311
+
# [ADFS](#tab/ADFS)
312
+
313
+
## Retrieve the Identity Application
314
+
1. Open a [session to the Privileged Endpoint](azure-stack-privileged-endpoint.md)
315
+
1. Run the following command to retrieve the ADFS Graph Applications
316
+
317
+
```PowerShell
318
+
Get-GraphApplication
319
+
```
320
+
321
+
1. Find the Identifier for the AzureStack-AppService application
- Workers are unable to reach file server when App Service is deployed in an existing virtual network, and the file server is only available on the private network, as called out in the Azure App Service on Azure Stack deployment documentation.
0 commit comments